From 545a227dfc099af8b17b6842e097196192658c3e Mon Sep 17 00:00:00 2001 From: Keir Fraser Date: Fri, 23 Oct 2009 10:04:03 +0100 Subject: passthrough/stubdom: clean up hypercall privilege checking This patch adds securty checks for pci passthrough related hypercalls to enforce that the current domain owns the resources that it is about to remap. It also adds a call to xc_assign_device to xend and removes the PRIVILEGED_STUBDOMS flags. Signed-off-by: Stefano Stabellini --- xen/Rules.mk | 4 ---- 1 file changed, 4 deletions(-) (limited to 'xen/Rules.mk') diff --git a/xen/Rules.mk b/xen/Rules.mk index 731e0cc88c..10847182ae 100644 --- a/xen/Rules.mk +++ b/xen/Rules.mk @@ -11,9 +11,6 @@ crash_debug ?= n gdbsx ?= n frame_pointer ?= n -# Allow some delicate passthrough related hypercalls to be made from a stubdom -privileged_stubdoms ?= y - XEN_ROOT=$(BASEDIR)/.. include $(XEN_ROOT)/Config.mk @@ -56,7 +53,6 @@ CFLAGS-$(perfc) += -DPERF_COUNTERS CFLAGS-$(perfc_arrays) += -DPERF_ARRAYS CFLAGS-$(lock_profile) += -DLOCK_PROFILE CFLAGS-$(frame_pointer) += -fno-omit-frame-pointer -DCONFIG_FRAME_POINTER -CFLAGS-$(privileged_stubdoms) += -DPRIVILEGED_STUBDOMS CFLAGS-$(gdbsx) += -DXEN_GDBSX_CONFIG ifneq ($(max_phys_cpus),) -- cgit v1.2.3